IN-PERSON

Philadelphia CISO Executive Summit

November 2, 2023 | Hilton Philadelphia at Penn's Landing

November 2, 2023
Hilton Philadelphia at Penn's Landing

Collaborate with your peers

Get together with Philadelphia's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Aligning technology with the entire organization to improve business outcomes

Creating a culture of innovation to improve processes and efficiencies

Building a culture of security and enabling smart, secure decision making

Philadelphia CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Todd Bearman

TE Connectivity
CISO

Mark Eggleston

Corporation Service Co
CISO

Anahi Santiago

Christiana Care
CISO

Reginald Williams

The Chemours Co
Chief Information Security Officer

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Philadelphia CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


November 1, 2023

November 2, 2023

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Edward Malinowski headshot

Edward Malinowski

CIO & CISO

Bayada Home Health Care

Governing Body members host this dinner for attendees to launch the event with an evening of peer networking at the Fork Restaurant.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

You Speak, They Swarm — The Power of Story in Reaching Your Audience

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

Guest Speaker

Speakers want action, not just applause. But busy executives don’t have time to learn complex communication models or esoteric storytelling processes — they need a simple, effective speaking framework that can help them not only connect with any audience, but also elicit real change. Enter the "Swarm Effect."

Join this session with Arthur Zards — a thought leader, TEDster and provocateur — to:

  • Hone your skills in executive influence
  • Adopt a more authentic and engaging approach to speaking
  • Take your next presentation from “understandable” to “compelling"

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

The Most Important Shift for Cybersecurity in a Generation

Nathan Smolenski headshot

Nathan Smolenski

Head of Cyber Intelligence Strategy

Netskope

Keith McMenamin headshot

Keith McMenamin

Vice President of Information Technology

Visit Philadelphia

Mark Eggleston headshot

Mark Eggleston

CISO

Corporation Service Co

Arvin Bansal headshot

Arvin Bansal

CISO Americas

Global Manufacturer

We live in a world where everything is hybrid and the blend between personal, corporate, private and public is ever-changing and presents us with a host of new challenges. This has increased and complicated the attack surface and the pressure to converge tools and do “more with less” is at peak levels. We must meet this watershed moment with the right team, plans, and technology.

Join this interactive session to learn:

  • How to build an effective plan for change without adding to the chaos
  • What consolidation approaches save money without sacrificing security
  • Use cases that deliver immediate value and efficiency while improving user experience

9:40am - 10:25am  Breakout Session

The Art of Optimizing

Samantha Davis headshot

Samantha Davis

CIO Americas

Arkema Inc.

Michael Carr headshot

Michael Carr

Chief Technology Officer

Vanguard Group

Kevin Gokey headshot

Kevin Gokey

SVP, Global Chief Information Officer

Church & Dwight

Today’s technology and security executives are being asked to do more with less. Some are tasked with driving innovation as they work to cut costs, and others are expected to improve processes and efficiencies while equipped with only legacy technology. All working toward the same goal — optimization and winning leadership buy-in along the way.

Grab a seat, and have your questions ready, as your peers discuss:

  • Aligning IT investments to the organization’s strategic business aspirations
  • Managing and retaining a team that’s already too small
  • Leveraging AI to optimize over time

9:40am - 10:25am  Executive Boardroom

Instituting Adaptive Enterprise-wide Governance

Joshua Beeman headshot

Joshua Beeman

Associate CIO

University of Pennsylvania

Jeff Linso headshot

Jeff Linso

Sr. Vice President Information Technology and Security

PetroChoice Lubrication Solutions

Today's rapidly evolving enterprise requires a governance model balanced with agility and conformance performance. According to Gartner, traditional IT governance cannot meet the needs of today's digital business. Organizations will need to deliver adaptive decision-making capabilities in pursuit of achieving the right governance outcomes to ensure a focus on strategic direction, effective execution, adaptability and composability.

In this session, CIOs & CISOs will discuss:

  • Introducing adaptability amongst ongoing market uncertainty
  • Prioritizing risk-adjusted execution flexibility
  • Motivating teams with desired business goal attainment

9:40am - 10:25am  Executive Boardroom

Managing OT to Fully Secure the Business

Todd Bearman headshot

Todd Bearman

CISO

TE Connectivity

For most organizations, the number of connected, essential devices is growing by the second. In response, the CISO's jurisdiction is changing just as rapidly. Now, in the case of any security issue, the rest of the C-suite may be looking to you for answers.

Join this session and start understanding:

  • Your new or growing operational technology responsibilities
  • What you can do to smoothly plot and control your OT workload
  • How you can best juggle IT and OT security simultaneously

10:25am - 11:00am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:00am - 11:45am  Breakout Session

Leading with Digital Sustainability - A Strategy Led by Technology

Jeff Jagoda headshot

Jeff Jagoda

Senior Chrome Enterprise Customer Engineer

Google Chrome Enterprise

Enterprises are under pressure to address multiple challenges impacting the planet, their people and profitability.  This is all happening while a recession is looming, quiet quitting is real and climate change is a top concern. Now is the time to position technology leaders as key partners in tackling these issues maximizes sustainable value across the business.
Join this session to explore sustainable strategies for:

  • Reducing efforts in the negative impact your company and products have on the planet (environmental sustainability)
  • How to best champion and manage the impact on your people (social sustainability)
  • Managing the business' fiscal health and future profitability (financial sustainability)

11:00am - 11:45am  Breakout Session

The Keys to Success — Collaboration Before and During an Attack

Monique St. John headshot

Monique St. John

VP, ACIO & CISO

Children's Hospital of Philadelphia

Jessica Van Kooten headshot

Jessica Van Kooten

AVP Technology Services and Deputy CISO

Children's Hospital of Philadelphia

Security and risk management leaders need to ensure the business is protected as best as possible when an inevitable ransomware attack strikes. But, those leaders must also have relationships in place across the business so when the time comes to execute the incident response plan, key players from different parts of the business are prepared to act quickly and efficiently.

Join this INTERACTIVE session to discuss in groups:

  • Identifying the key players across the organization who will need to take part in creating and activating your incident response plan
  • Training those involved so everyone knows their roles
  • Best ways to collaborate during a sophisticated cyberattack

11:00am - 11:45am  Executive Boardroom

A Cloud Crossroads – Trends in Innovation, Multi-Cloud and Kubernetes

James Edmunds headshot

James Edmunds

Vice President, Information Technology

Allan Myers

Ed Jablonski headshot

Ed Jablonski

EVP, CTO

Fulton Financial

Abdul Malik headshot

Abdul Malik

Principal Engagement Manager

Expel

Cloud security is constantly evolving, emphasizing the need for organizations of all shapes and sizes to fully understand the potential impact of their cloud security strategies on their overall business success. With multi-cloud solution adoption surging, the challenges facing security teams are ever-evolving and it can be difficult to stay ahead of the latest advances. Dive deep into cloud security trends and challenges, discuss perceptions and perspectives on security-enabled innovation, and analyze emerging cloud usage patterns to see what to prepare for in cloud security – now and into the future.

Join this session to discuss:

  • The apparent disconnect between the C-suite and security personnel around the role cybersecurity plays in fostering innovation
  • Surprising findings suggesting that some workloads are moving from the cloud and going back on-prem
  • The rising popularity of containerization and how it aligns with the "shifting left" trend in DevSecOps

11:45am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Making Security a Core Company Value – And a Shared Responsibility

Sam Curry headshot

Sam Curry

VP, CISO

Zscaler

In an age where cyber risk is business risk, CIOs and CISOs are ultimately responsible for instilling a security mindset in every employee within an organization. Rather than a siloed concern, managing this risk must risk to the highest levels of leadership. As we know, cyberattacks can be as devastating as lawsuits, legislative non-compliance, and fraud. This session offers board members, executives, and technology leaders ideas for cultivating a strong security mindset throughout their organization.

Join this session to learn:

  • How to foster inclusive conversations on cybersecurity by framing issues in terms of business risk
  • Methods for protecting your organization at every level by integrating security and automation into the CI/CD pipeline
  • How to identify, understand, and prepare for social engineering and AI-enabled attacks

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Building Cyber Resilience — Why Does it Matter and How Can You Get Started?

Jim Richberg headshot

Jim Richberg

Public Sector Field CISO and VP of Information Security

Fortinet

Building cyber resilience is gaining prominence as a priority for many organizations. The classic ingredients of people, process, technology can be applied creatively and in multiple ways to address this challenge. But how do you go about implementing this change?

Join this interactive discussion to learn:

  • Simplifying the framework for success
  • Multiplying approaches of implementation
  • Building resilience through best practices and common pitfalls

1:30pm - 2:15pm  Breakout Session

Defining Enterprise-wide IT Strategy — Bridging Business Objectives with Technical Excellence

Vincent Miller headshot

Vincent Miller

CIO US Food & Facilities

Aramark

Donna Ross headshot

Donna Ross

EVP & Chief Information Security Officer

Radian Group Inc.

Melanie Harris headshot

Melanie Harris

CIO

School District Of Philadelphia

IT & Security leaders can increase the value of IT through operating model changes and creating business alignment efficiencies. By working collaboratively with business units, CIOs & CISOs can prioritize technology needs and invest in capabilities to achieve excellence in operating model structure.

Join this session with an interactive panel to discuss:

  • Building an IT strategy closely aligned with the business strategy
  • Driving operational change with strategic change management
  • Attaining efficiencies with a consistent approach to processes

1:30pm - 2:15pm  Executive Boardroom

New Cybersecurity Rules and Regulations: Are You Prepared?

Reginald Williams headshot

Reginald Williams

Chief Information Security Officer

The Chemours Co

Tracey Brand - Sanders headshot

Tracey Brand - Sanders

CISO

UGI Corporation

As cybersecurity incidents continue to impact businesses around the world, rules and regulations are constantly changing to address emerging concerns. As a leader in a quickly-changing landscape, you must balance following new regulations and educating company leaders about cybersecurity.

Join this session to discuss:

  • What business impacts new SEC rulings will have
  • How CISOs roles and responsibilities are shifting
  • Strategies for communicating materiality to an organization

2:15pm - 2:50pm  Networking Break

2:20pm - 2:45pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:50pm - 3:35pm  Breakout Session

Generative AI — What’s Your Take?

Anahi Santiago headshot

Anahi Santiago

CISO

Christiana Care

Generative AI — oh my! As this topic makes its way to the boardroom and dinner table alike, it’s up to technology & security leaders to determine the priorities to focus on now. 

Join this session to discuss and debate with your peers:

  • Hot topics surfacing across industries
  • Business impacts of emerging trends
  • Key strategies for communicating new trends to stakeholders

2:50pm - 3:35pm  Executive Boardroom

How to Select a Third-Party Risk Management Framework

Andre Jenkins headshot

Andre Jenkins

Deputy Chief Information Security Officer (CISO)

University of Pennsylvania

Brandi Burton headshot

Brandi Burton

Senior Director, Governance, Risk and Compliance

TE Connectivity

In today’s business environment, organizations are held responsible for the actions of their suppliers, vendors and partners. Knowledge and understanding of supplier and third-party risk is of the utmost importance to CISOs and the teams they support. Organizations must know their business well enough to understand where risks may materialize and employ processes to detect and react to their evolving risk from third parties.

Join this session to discuss:

  • How to create an accurate inventory of all vendors within your ecosystem
  • Strategies to establish a process for continuous assessment and monitoring of third parties
  • What to do when your third party gets breached

3:35pm - 4:00pm  Break

4:00pm - 4:35pm  Keynote

Shift Your Focus From Problems to Value — Transform Your Role as a Technology Leader

Irving Tyler headshot

Irving Tyler

Distinguished VP Analyst

Gartner

Part of the CIOs & CISO's journey with outcome-driven leadership requires a shift from problem solver to value creator. Their critical path to value leadership includes outcomes over outputs, proaction overreaction and offers over orders.

Join this session to discuss:

  • Mastering your value creation system
  • Mapping out clear outcomes in order to determine the right outputs necessary to achieve them
  • Building relationships in the C-Suite to achieve synergy to improve outcomes

4:35pm - 5:00pm  Closing Reception & Prize Drawing

6:00pm - 8:30pm  Governing Body Welcome Reception

Governing Body Welcome Reception

Edward Malinowski headshot

Edward Malinowski

CIO & CISO

Bayada Home Health Care

Governing Body members host this dinner for attendees to launch the event with an evening of peer networking at the Fork Restaurant.

7:45am - 8:30am  Registration & Breakfast

8:30am - 9:15am  Keynote

You Speak, They Swarm — The Power of Story in Reaching Your Audience

Arthur Zards headshot

Arthur Zards

Thought Leader, TED/TEDx Speaker, Coach & Producer

Guest Speaker

Speakers want action, not just applause. But busy executives don’t have time to learn complex communication models or esoteric storytelling processes — they need a simple, effective speaking framework that can help them not only connect with any audience, but also elicit real change. Enter the "Swarm Effect."

Join this session with Arthur Zards — a thought leader, TEDster and provocateur — to:

  • Hone your skills in executive influence
  • Adopt a more authentic and engaging approach to speaking
  • Take your next presentation from “understandable” to “compelling"

9:15am - 9:40am  Networking Break

9:40am - 10:25am  Breakout Session

The Most Important Shift for Cybersecurity in a Generation

Nathan Smolenski headshot

Nathan Smolenski

Head of Cyber Intelligence Strategy

Netskope

Keith McMenamin headshot

Keith McMenamin

Vice President of Information Technology

Visit Philadelphia

Mark Eggleston headshot

Mark Eggleston

CISO

Corporation Service Co

Arvin Bansal headshot

Arvin Bansal

CISO Americas

Global Manufacturer

We live in a world where everything is hybrid and the blend between personal, corporate, private and public is ever-changing and presents us with a host of new challenges. This has increased and complicated the attack surface and the pressure to converge tools and do “more with less” is at peak levels. We must meet this watershed moment with the right team, plans, and technology.

Join this interactive session to learn:

  • How to build an effective plan for change without adding to the chaos
  • What consolidation approaches save money without sacrificing security
  • Use cases that deliver immediate value and efficiency while improving user experience

9:40am - 10:25am  Breakout Session

The Art of Optimizing

Samantha Davis headshot

Samantha Davis

CIO Americas

Arkema Inc.

Michael Carr headshot

Michael Carr

Chief Technology Officer

Vanguard Group

Kevin Gokey headshot

Kevin Gokey

SVP, Global Chief Information Officer

Church & Dwight

Today’s technology and security executives are being asked to do more with less. Some are tasked with driving innovation as they work to cut costs, and others are expected to improve processes and efficiencies while equipped with only legacy technology. All working toward the same goal — optimization and winning leadership buy-in along the way.

Grab a seat, and have your questions ready, as your peers discuss:

  • Aligning IT investments to the organization’s strategic business aspirations
  • Managing and retaining a team that’s already too small
  • Leveraging AI to optimize over time

9:40am - 10:25am  Executive Boardroom

Instituting Adaptive Enterprise-wide Governance

Joshua Beeman headshot

Joshua Beeman

Associate CIO

University of Pennsylvania

Jeff Linso headshot

Jeff Linso

Sr. Vice President Information Technology and Security

PetroChoice Lubrication Solutions

Today's rapidly evolving enterprise requires a governance model balanced with agility and conformance performance. According to Gartner, traditional IT governance cannot meet the needs of today's digital business. Organizations will need to deliver adaptive decision-making capabilities in pursuit of achieving the right governance outcomes to ensure a focus on strategic direction, effective execution, adaptability and composability.

In this session, CIOs & CISOs will discuss:

  • Introducing adaptability amongst ongoing market uncertainty
  • Prioritizing risk-adjusted execution flexibility
  • Motivating teams with desired business goal attainment

9:40am - 10:25am  Executive Boardroom

Managing OT to Fully Secure the Business

Todd Bearman headshot

Todd Bearman

CISO

TE Connectivity

For most organizations, the number of connected, essential devices is growing by the second. In response, the CISO's jurisdiction is changing just as rapidly. Now, in the case of any security issue, the rest of the C-suite may be looking to you for answers.

Join this session and start understanding:

  • Your new or growing operational technology responsibilities
  • What you can do to smoothly plot and control your OT workload
  • How you can best juggle IT and OT security simultaneously

10:25am - 11:00am  Networking Break

10:30am - 10:55am  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:00am - 11:45am  Breakout Session

Leading with Digital Sustainability - A Strategy Led by Technology

Jeff Jagoda headshot

Jeff Jagoda

Senior Chrome Enterprise Customer Engineer

Google Chrome Enterprise

Enterprises are under pressure to address multiple challenges impacting the planet, their people and profitability.  This is all happening while a recession is looming, quiet quitting is real and climate change is a top concern. Now is the time to position technology leaders as key partners in tackling these issues maximizes sustainable value across the business.
Join this session to explore sustainable strategies for:

  • Reducing efforts in the negative impact your company and products have on the planet (environmental sustainability)
  • How to best champion and manage the impact on your people (social sustainability)
  • Managing the business' fiscal health and future profitability (financial sustainability)

11:00am - 11:45am  Breakout Session

The Keys to Success — Collaboration Before and During an Attack

Monique St. John headshot

Monique St. John

VP, ACIO & CISO

Children's Hospital of Philadelphia

Jessica Van Kooten headshot

Jessica Van Kooten

AVP Technology Services and Deputy CISO

Children's Hospital of Philadelphia

Security and risk management leaders need to ensure the business is protected as best as possible when an inevitable ransomware attack strikes. But, those leaders must also have relationships in place across the business so when the time comes to execute the incident response plan, key players from different parts of the business are prepared to act quickly and efficiently.

Join this INTERACTIVE session to discuss in groups:

  • Identifying the key players across the organization who will need to take part in creating and activating your incident response plan
  • Training those involved so everyone knows their roles
  • Best ways to collaborate during a sophisticated cyberattack

11:00am - 11:45am  Executive Boardroom

Analyzing Your Application and Infrastructure Technology Strategy

Ted Bredikin headshot

Ted Bredikin

CIO, VP of Technology

UnitedHealth Group

Mike Bizzoco headshot

Mike Bizzoco

VP, IT Service Delivery, Data & Analytics

South Jersey Industries

Applications can make or break an organization’s growth. Too many and you create an opportunity for redundancies and inefficiencies; too few and you risk getting left in the past. In today’s digital-first workspaces, how can leaders evolve their strategy to maximize the value of their applications, advance key digital initiatives and remain agile in the face of constant change?

Join your peers to discuss:

  • Discontinuing legacy systems, modernizing, and shifting to agile solutions
  • Building a business case for application and technology rationalization
  • Creating architectures that evolve with ever-changing business requirements

11:45am - 12:30pm  Lunch Service

12:30pm - 1:05pm  Keynote

Making Security a Core Company Value – And a Shared Responsibility

Sam Curry headshot

Sam Curry

VP, CISO

Zscaler

In an age where cyber risk is business risk, CIOs and CISOs are ultimately responsible for instilling a security mindset in every employee within an organization. Rather than a siloed concern, managing this risk must risk to the highest levels of leadership. As we know, cyberattacks can be as devastating as lawsuits, legislative non-compliance, and fraud. This session offers board members, executives, and technology leaders ideas for cultivating a strong security mindset throughout their organization.

Join this session to learn:

  • How to foster inclusive conversations on cybersecurity by framing issues in terms of business risk
  • Methods for protecting your organization at every level by integrating security and automation into the CI/CD pipeline
  • How to identify, understand, and prepare for social engineering and AI-enabled attacks

1:05pm - 1:30pm  Break

1:30pm - 2:15pm  Breakout Session

Building Cyber Resilience — Why Does it Matter and How Can You Get Started?

Jim Richberg headshot

Jim Richberg

Public Sector Field CISO and VP of Information Security

Fortinet

Building cyber resilience is gaining prominence as a priority for many organizations. The classic ingredients of people, process, technology can be applied creatively and in multiple ways to address this challenge. But how do you go about implementing this change?

Join this interactive discussion to learn:

  • Simplifying the framework for success
  • Multiplying approaches of implementation
  • Building resilience through best practices and common pitfalls

1:30pm - 2:15pm  Breakout Session

Defining Enterprise-wide IT Strategy — Bridging Business Objectives with Technical Excellence

Vincent Miller headshot

Vincent Miller

CIO US Food & Facilities

Aramark

Donna Ross headshot

Donna Ross

EVP & Chief Information Security Officer

Radian Group Inc.

Melanie Harris headshot

Melanie Harris

CIO

School District Of Philadelphia

IT & Security leaders can increase the value of IT through operating model changes and creating business alignment efficiencies. By working collaboratively with business units, CIOs & CISOs can prioritize technology needs and invest in capabilities to achieve excellence in operating model structure.

Join this session with an interactive panel to discuss:

  • Building an IT strategy closely aligned with the business strategy
  • Driving operational change with strategic change management
  • Attaining efficiencies with a consistent approach to processes

1:30pm - 2:15pm  Executive Boardroom

New Cybersecurity Rules and Regulations: Are You Prepared?

Reginald Williams headshot

Reginald Williams

Chief Information Security Officer

The Chemours Co

Tracey Brand - Sanders headshot

Tracey Brand - Sanders

CISO

UGI Corporation

As cybersecurity incidents continue to impact businesses around the world, rules and regulations are constantly changing to address emerging concerns. As a leader in a quickly-changing landscape, you must balance following new regulations and educating company leaders about cybersecurity.

Join this session to discuss:

  • What business impacts new SEC rulings will have
  • How CISOs roles and responsibilities are shifting
  • Strategies for communicating materiality to an organization

1:30pm - 2:15pm  Executive Boardroom

Driving Innovation Through Strategic Planning

Vishi Viswanathan headshot

Vishi Viswanathan

CIO & SVP Business Services

Day & Zimmermann Group

John Walsh headshot

John Walsh

Head of Commercial IT, North America

Otsuka America

When innovation can mean many things, how do you operationalize it to lead organizational change effectively? Innovation and continuous improvement remain top of mind for technology and security leaders to drive business growth and revenue. Balancing the complexities of an organization’s architecture, risk, and appetite, a CIO or CISO must be strategic about how and when to push for ingenuity.

Join this session to discuss the following:

  • Working with teams across the business to operationalize innovation
  • Planning for and weaving innovation into business processes
  • Examples of innovative business outcomes from game-changing technologies

2:15pm - 2:50pm  Networking Break

2:20pm - 2:45pm  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

2:50pm - 3:35pm  Breakout Session

Generative AI — What’s Your Take?

Anahi Santiago headshot

Anahi Santiago

CISO

Christiana Care

Generative AI — oh my! As this topic makes its way to the boardroom and dinner table alike, it’s up to technology & security leaders to determine the priorities to focus on now. 

Join this session to discuss and debate with your peers:

  • Hot topics surfacing across industries
  • Business impacts of emerging trends
  • Key strategies for communicating new trends to stakeholders

2:50pm - 3:35pm  Executive Boardroom

Connecting Business, Data and Technology

Helane Stein headshot

Helane Stein

SVP & CIO

Brixmor Property Group

Chris Kulczytzky headshot

Chris Kulczytzky

Head of Finance and Procurement Technology

IQVIA

According to Gartner, the challenge for many IT and business leaders today is to instill a culture of data-driven decision-making across the organization. Those who want to exploit the potential of new data and advanced analytics capabilities at scale typically face numerous challenges. 

Join your peers to:

  • Discuss best practices for designing data and analytics programs
  • Identify and define quick-win opportunities supporting the business data strategy
  • Brainstorm technology and resource alignment

3:35pm - 4:00pm  Break

4:00pm - 4:35pm  Keynote

Shift Your Focus From Problems to Value — Transform Your Role as a Technology Leader

Irving Tyler headshot

Irving Tyler

Distinguished VP Analyst

Gartner

Part of the CIOs & CISO's journey with outcome-driven leadership requires a shift from problem solver to value creator. Their critical path to value leadership includes outcomes over outputs, proaction overreaction and offers over orders.

Join this session to discuss:

  • Mastering your value creation system
  • Mapping out clear outcomes in order to determine the right outputs necessary to achieve them
  • Building relationships in the C-Suite to achieve synergy to improve outcomes

4:35pm - 5:00pm  Closing Reception & Prize Drawing

November 1, 2023

November 2, 2023

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


MORE INFORMATION

A block of rooms has been reserved at the Hilton Philadelphia at Penn's Landing at a reduced conference rate. Reservations should be made online or by calling +1 215-521-6500.

Deadline to book using the discounted room rate of $239 USD (plus tax) is October 9, 2023.

Your Community Partners


Global Thought Leaders
CISO Thought Leaders
Key Partners
Program Partner

Community Program Manager


For inquiries related to this community, please reach out to your dedicated contact.

Jeff Hull

Community Program Manager

214-649-0033

jeff.hull@evanta.com